Chinese Tool Hacks Seized Phones to Extract Sensitive Data

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 17, 2025 4 min read

Chinese Malware Massistant Targets Mobile Data

Security researchers have reported that Chinese authorities are utilizing a sophisticated malware tool called Massistant to extract data from seized mobile devices. Developed by Xiamen Meiya Pico, this tool allows authorities to obtain sensitive information such as text messages (including those from encrypted apps like Signal), images, location histories, audio recordings, and contacts.

Massistant operates on Android devices and is designed for forensic data extraction, necessitating physical access to the target device. Its widespread use raises significant concerns for both Chinese residents and travelers to China, as they risk having their devices confiscated and data collected. Kristina Balaam, a researcher at Lookout, warned, "I think anybody who’s traveling in the region needs to be aware that the device that they bring into the country could very well be confiscated and anything that’s on it could be collected."

Massistant device configuration
Image courtesy of TechCrunch

The malware is installed on an unlocked device and works in conjunction with specialized hardware connected to a computer. Balaam noted that while Massistant has been found on user devices after police interactions, Lookout has not yet analyzed its desktop component or confirmed compatibility with Apple devices. The tool's installation leaves traces, allowing users to potentially identify and remove it, though by that point, the data has likely already been compromised.

Massistant is considered the successor to a previous tool known as MSSocket, also developed by Xiamen Meiya Pico, which holds a significant share of China's digital forensics market. The company has faced U.S. sanctions for supplying technology to the Chinese government. Balaam emphasized that Massistant is just one of many malware tools produced by Chinese surveillance tech manufacturers, existing within a larger ecosystem of spyware.

For further details, you can refer to the original sources: TechCrunch and Lookout’s Threat Intelligence Report.

APT27 Hacking Campaign Targets U.S. Entities

The U.S. Department of Justice has unsealed indictments against two Chinese nationals, Yin Kecheng and Zhou Shuai, linked to a sophisticated hacking campaign targeting numerous U.S. companies and institutions. These individuals, associated with the Chinese government, are accused of participating in a long-term scheme to exfiltrate sensitive data and sell it for profit.

Yin and Zhou, connected to the hacking group known as APT27, have been implicated in cyber intrusions affecting a range of sectors, including technology firms, think tanks, and government agencies. The Department of Justice's coordinated effort highlights the Chinese government's role in fostering cybercriminal activity among its citizens.

The indictments reveal methods employed by APT27, which include exploiting network vulnerabilities and installing malware to maintain persistent access to compromised systems. These actions have resulted in significant financial damages and the loss of sensitive data.

The Justice Department's actions include the seizure of virtual private servers and domains linked to these hackers, underscoring the ongoing threat posed by state-sponsored cybercrime. U.S. Attorney Edward R. Martin, Jr. stated, “These indictments and actions show this Office’s long-standing commitment to vigorously investigate and hold accountable Chinese hackers and data brokers who endanger U.S. national security.”

For more information, refer to the full press release from the U.S. Department of Justice.

CBP Seeks Advanced Digital Forensics Tools

U.S. Customs and Border Protection (CBP) is actively seeking proposals from technology companies for advanced digital forensics tools to analyze data on devices seized at the border. The agency is looking for capabilities to process text messages, pictures, videos, and contacts from smartphones and other electronic devices.

CBP currently uses Cellebrite technology for data extraction but aims to modernize its digital forensics program. The agency reported conducting searches on over 47,000 electronic devices in a recent year, indicating a growing reliance on digital data analysis for security purposes.

The request for information details specific requirements, such as identifying hidden languages in text messages and accessing encrypted messaging app chats. CBP's plans to enhance its digital forensics capabilities come amid increased scrutiny and reports of travelers being questioned about their devices.

Cellebrite's digital forensics tools, including its Universal Forensic Extraction Device, are designed for comprehensive data analysis. This technology enables users to filter and analyze large datasets, making it a crucial resource for law enforcement agencies.

For additional insights, visit WIRED’s coverage and CBP's official guidelines on device searches.

National Guard Hacked by Salt Typhoon Group

A recent Department of Homeland Security memo revealed that the elite Chinese cyberspy group known as Salt Typhoon hacked a state’s National Guard network for nearly a year. This breach is part of a broader pattern of cyberespionage attributed to the group, which has previously targeted various U.S. entities.

The hackers allegedly accessed sensitive military and law enforcement information, compromising internal networks and potentially facilitating further attacks on other organizations. The extent of the data accessed is still under investigation, but the implications for national security are significant.

The memo indicates that Salt Typhoon has demonstrated the ability to infiltrate multiple organizations, raising concerns about the vulnerability of U.S. defense and law enforcement networks. The lack of conclusive evidence linking the group to the Chinese government continues to be a point of contention.

To learn more about this hacking incident, refer to the NBC News report and the DHS memo detailing Salt Typhoon's activities.

National Guard operation
Image courtesy of U.S. Army

For comprehensive information, visit NBC News and review the DHS memo on the Salt Typhoon group.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article